Category Archives: Uncategorized

419 SCAM / EMAIL SCAM / PHONY INVESTMENT PROPOSAL

We are seeking the attention of investors, project owners and general business facilitators.

Mubadala development company (Mubadala), is a project development and investment organizationbased in Abu dhabi – UAE. At the core of our strategy, Mubadala makes long term capital intensiveinvestments to deliver strong financial returns and economic diversification. Mubadala focuses onnumber of areas in which it has developed significant competitive advantage, including acquisitions,aerospace/aviation, telecommunication, technology, energy, industry, healthcare, infrastructure,real estate and service ventures.

Mubadala Development Company (Mubadala) is a catalyst for the economic diversification of AbuDhabi. Established and owned by the Government of UAE, the organization’s strategy is built on themanagement of Long-term capital-intensive investments that deliver strong financial returns andtangible social benefits for the Emirates.

Mubadala brings together and manages a multi-billion dollar portfolio of local, regional and internationalinvestments, which we wish to re-invest through project funding in investment loan to third partyinvestors, project owners and general business facilitators on a 3.5% interest rate per annum on longterm investment projects that can generate up to 10% ROI within the period.

We invite all interested project owners, entrepreneurs and investors – UAE or non- UAE to contact theundersigned for further information on procedures for consideration.

Sign-in Seal

Sign-in seals are a safeguard from Yahoo! Mail. They help you fight online phishing scams (people trying to trick you into giving up your password or personal information by spoofing legitimate web sites).

Here’s how your sign-in seal works: You provide us with an image (such as a personal photo) or a secret message. Whenever we ask you to sign into Yahoo! Mail, we’ll display your image or message. If it’s not displayed, you may have landed on a “spoofed” site. It only takes a minute to create your sign-in seal.

Note: Your sign-in seal is saved on the computer that you create it on, not on Yahoo! Mail’s servers. So if you use more than one computer or browser, you’ll want to create a sign-in seal for each one. Also, don’t create a sign-in seal on a computer you share with strangers, such as those in libraries, Internet cafés, and other public places

Phishing Tips

Avoiding phishing scams is tough. Phishers know every trick in the book, and they’re dreaming up new ones as we speak. So here are some things to keep in mind while you’re online:

Do NOT click any button in these pop-ups, such as a “Close” or “No” button, or the “Close” box that may appear in the upper-right corner of the pop-up. Doing this might install a virus or other malicious software on your computer. To safely close a pop-up ad, press Ctrl-W (if you’re using a Windows computer) or Command-W (on a Mac computer).

Be suspicious of “free” advice.You may receive an email that claims to be from a computer expert, warning you of a virus. These are usually hoaxes. Do not follow the steps described in any email unless you’re sure the threat is real.

There is no Yahoo! Lottery. Don’t be fooled by people pretending to be Yahoo! and offering cash prizes. We would never send you information about a contest you never entered. If you’ve received a message like “Final Notification: Yahoo! Mail Winner!” or “Your Email Address Has Won $XX million,” it’s a scam. Don’t reply to the email, don’t click any links in it, and never divulge any personal information. Instead, click the “Spam” button.

Authentication

Phishing is the act of creating legitimate looking messages, masquerading as a trusted entity to lure you into clicking on emails that are designed to steal vital personal information like your password and financial data. To prevent such email forgery and spoofing we use DomainKeys Identified Mail (DKIM) which allows senders to digitally sign their emails so that Yahoo! Mail can then verify the authenticity of the sender. In addition, Yahoo! Mailsupports Domain-based Message Authentication, Reporting and Conformance (DMARC), a specification spearheaded by major technology providers and email senders to collectively fight spam and phishing scams.

Greetings to you, my friend.I know this will come as a surprise to you, because you do not know me. My name is Abdul Al-Shallah and I am the son of a deposed government official in Nigeria.

Sound familiar? It’s a boilerplate opening for one of the most common scams in the known world — the Nigerian scam, also known as the “419 scam” or the advance fee scheme. The elements are always the same: someone (preferably royalty or some sort of official) has come into a lot of money, but needs another person outside of the country to use their money for a bribe (or to pay legal fees among other means) to spring the money free. The result is also predictable, with a wire transfer to a con artist’s account and a fake check that confirms a scam has taken place.

This scam is a hallmark of the Internet, but it’s actually much older than that — the advance fee scheme in its modern incarnation dates back to the early 1980s, and various forms can be traced back to before the 20th century. The reason that it sticks around, unsurprisingly, is because it never ceases to swindle millions of dollars from duped victims. The scheme, and many others like it continue to flood inboxes daily, often hitting the Spam folder before you ever lay eyes on it, waiting for a more trusting person to make a trip to the Western Union.

But that’s not to say that Internet scammers are resting on their laurels and leaving their dirty work to these classic methods. As Internet users become more sophisticated (and laugh at the advances of the forlorn Nigerian prince or similarly befallen individual), the chances of finding a willing innocent victim slowly dwindles. Like any other industry, scammers are looking for smarter, more efficient ways to reach their big payouts and to keep their “businesses” running smoothly, so they are forced to adapt and reach new extremes to get their money.

Now, security experts are seeing disturbing trends among scammers that make the old schemes appear to be child’s play. Appealing to the emotional pull of a victim is now just part of the scheme, which now includes familiarity dupes and long-term schemes to raid a bank account. These cons are more targeted, more ruthless and can take out even large corporations and entire governmental programs. There’s a new evolution in Internet con artistry, and it’s putting everyone at risk.

As part of the 2013 UN-Habitat compensation payment reconciliation process, we have been advised to inform you that your compensation payment (US$2,811,071.00) has now been forwarded to the Diplomatic Courier Service under the supervision and directives of the U.S. Department of State, to convey your overdue compensation payment delivery to you in cash payment.

You are therefore advised to contact the U.S. Diplomatic Courier Service with your:-

Like this:

Internet fraud is an issue that many people experience. The best way to fight fraud is to learn how to detect and avoid becoming a victim. If you have already been victimized then there IS help available. Below is a link which will lead you to a list of official Government web resources provided by USA.GOV to help you learn and report online fraud.

There’s been an increase in employment scams pertaining to mystery/secret shopper positions, according to the Internet Crime Complaint Center (IC3). The reason the secret shopper scam is so believable is because many retail and service corporations do hire evaluators to perform secret or random checks on their competitors. Scammers know this and capitalize on the opportunity.

Victims have reported to the IC3 they were contacted via e-mail and U.S. mail to apply to be a mystery shopper. Applicants send a resume and are told that they will be subject to an extensive background check before being accepted as a mystery shopper. The employees are sent a check with instructions to shop at a specified retailer for a specific length of time and spend a specific amount on merchandise from the store. The employees receive instructions to take note of the store’s environment, color, payment procedures, gift items, and shopping/carrier bags and report back to the employer. The second evaluation is the ease and accuracy of wiring money from the retail location. The money to be wired is also included in the check sent to the employee. The remaining balance is the employee’s payment for the completion of the assignment. After merchandise is purchased and money is wired, the employees are advised by the bank the check cashed was counterfeit, and they are responsible for the money lost in addition to bank fees incurred.

In other versions of the scheme, applicants are requested to provide bank account information to have money directly deposited into their accounts. The criminal then has acquired access to these victims’ accounts and can withdraw money, which makes the applicant a victim of identity theft.

—–IMPORTANT: For your protection and to prevent malicious use, all emails sentvia this web site are logged and the contents recorded and available to thestore owner. If you feel that you have received this email in error, pleasesend an email to thescrappersattic@yahoo.com

This email address was given to us by you or by one of our customers. If youfeel that you have received this email in error, please send an email tothescrappersattic@yahoo.com This email is sent in accordance with the US CAN-SPAM Law in effect01/01/2004. Removal requests can be sent to this address and will be honoredand respected.